InfoSec News

The U.S. Federal Trade Commission's antitrust investigation into Google's search engine could shine some light on the secret inner workings of the company's search ranking decisions and the relationship between advertising and free search results, some Google critics said Friday.
 
With the next release of Windows Server operating system, Microsoft has conquered one of the thorniest problems in virtualization: moving an operational virtual machine (VM) across a wide area network (WAN).
 
While there were a lot of impressive technologies at this year's DEMO convention, WeVideo looks like it has the most potential to be the Next Big Thing.
 
Chip and system-level improvements that Intel is making with the Ivy Bridge microarchitecture will result in laptops out next year with longer battery life and better graphics, the company said this week.
 
An Italian security researcher this week disclosed details of several zero-day vulnerabilities he discovered in SCADA products from multiple vendors, a disclosure likely to reinforce concerns about critical infrastructures.
 
Google's share of the enterprise email market currently 'hovers' at around 1%, but it will reach 10% within a few years, research firm Gartner predicts.
 
Two prominent Chinese hackers have released a convention calling for the rejection of cybertheft and are asking their peers to support it, as China is increasingly seen as the source of international hacking attacks.
 
Intel this week promised that a smartphone based on its Atom processor will hit the market in the first quarter of 2012, while Google pledged to make future Android releases work on Intel's mobile chips. To analysts, the latest Intel-Google partnership wasn't all that significant.
 
Google today patched 32 vulnerabilities in Chrome, paying more than $14,000 in bug bounties as it also upgraded the stable edition of the browser to version 14.
 
American cloud providers may find themselves unable to sell to the Dutch government due to concerns that the vendors could be compelled to share data with U.S. authorities under the provisions of the Patriot Act. Similar concerns are being raised in the European Parliament.
 
American cloud providers may find themselves unable to sell to the Dutch government due to concerns that the vendors could be compelled to share data with U.S. authorities under the provisions of the Patriot Act. Similar concerns are being raised in the European Parliament.
 
The Bank of England has signed a contract with EMC to expand data storage with new SAN devices, as it considers rolling out virtual desktops to staff.
 
Apache HTTP Server CVE-2011-3348 Denial Of Service Vulnerability
 
A new validation program will certify point-to-point encryption systems that use devices for encryption and decryption as well as hardware security modules.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Sharp is discontinuing the production of two of its three Galapagos tablets less then a year after launching them.
 
U.S. President Barack Obama has signed the America Invents Act, the first major overhaul of the U.S. patent system in about 50 years.
 
Oracle has added additional commercial extensions to the enterprise edition of its open-source MySQL database, further differentiating it from the community version available to anyone at no charge.
 
Google will soon launch a social news magazine for iPads and Android tablets called Propeller, according to reports. The app would compete with the popular Flipboard app on the iPad, which Google tried to buy but its offer was refused.
 
Microsoft CEO Steve Ballmer on Wednesday strongly hinted that the company will craft a Metro-style version of the next Office suite.
 
AT&T will officially launch its faster LTE wireless service on Sunday in five cities: Atlanta, Chicago, Dallas, Houston and San Antonio.
 
Tech stocks rose along with major indexes this week as central banks came up with a plan to ease market fears about European sovereign debt, and as key IT players including Microsoft, Intel, and Cisco held conferences for developers, users and analysts.
 
[DSECRG-11-032] SAP NetWeaver ipcpricing - information disclose (by ERPScan)
 
[DSECRG-11-033] SAP Crystal Report Server pubDBLogon - Linked ÕSS vulnerability (by ERPScan)
 
CFP for first independent international Security Conference in Russia - ZeroNights (by Defcon-Russia)
 
Re: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission
 
System Restore regularly backs up your Windows installation, but the backups soon disappear. Robert Fiorini wants to know if there's a way to save them permanently.
 
When it comes to things like movies and museums, it's all about the experience. But that experience is going to change because it's no longer necessary or even as pleasurable to be at those venues as it once was and you know what will take their place? No? Read on.
 
RE: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission
 
RE: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission
 
RE: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission
 
RE: [Full-disclosure] Microsoft's Binary Planting Clean-Up Mission
 
Oracle has issued an emergency patch to fix a vulnerability it says could bring down HTTP application servers it sells that are based on Apache 2.0 or 2.2.
 
Mobile startup LightSquared struck back against a report on Thursday that it had received preferential treatment from the Obama Administration as it sought permission to build a cellular data network that appears to hurt GPS performance.
 
Mini-stream Ripper '.m3u' File Buffer Overflow Vulnerability
 
"Consumerization of IT" may be an overused phrase, but it is by no means a fad. Workers nationwide are coming to expect that personal devices will connect to corporate networks. That's killing IT.
 
These 11 Android apps can help you increase the efficiency and speed of your mobile device.
 
These 11 Android apps can help you increase the efficiency and speed of your mobile device.
 
The U.S. Federal Trade Commission has proposed amendments to online privacy rules for children that aim to give parents control over what personal information websites may collect from children under 13.
 
Adobe Acrobat and Reader CVE-2011-1353 Local Privilege Escalation Vulnerability
 
A California man who dug up sensitive information belonging to U.S. service members on peer-to-peer networks, and then used it to order iPods, cameras, and even washing machines from an online store, was sentenced to 75 months in federal prison Thursday.
 

Posted by InfoSec News on Sep 15

http://www.theindiasite.com/india-hacked-part-ii-cyber-warfare-the-new-battlefield/

By Ulrik McKnight
The India Site
Sep 15, 2011

In Part I of India Hacked, The Extent of the Compromise, we explored the
extensive hacking of corporate and political India. In Part II we
examine the national security implications of this trend.

State-Level Hacking

China has repeatedly been found to use its expertise as a cyber-power to
access highly...
 

Posted by InfoSec News on Sep 15

http://www.informationweek.com/news/government/security/231601481

By Elizabeth Montalbano
InformationWeek
September 15, 2011

Federal agencies must begin reporting security data to an online
compliance tool as part of fiscal year 2011 requirements for the Federal
Information Security Management Act (FISMA).

The Department of Homeland Security (DHS) outlined new requirements for
FISMA, the National Institute of Standards and Technology (NIST)...
 

Posted by InfoSec News on Sep 15

http://www.networkworld.com/news/2011/091511-homeland-security-banking-250924.html

By Tim Greene
Network World
September 15, 2011

The Department of Homeland Security works with financial institutions to thwart
cyber attacks and plans to do so more and more in the future, according to DHS
testimony to Congress, including sharing top secret cyber intelligence.

"To achieve our shared goals, we need to increase the sharing of timely and...
 

Posted by InfoSec News on Sep 15

http://www.eweek.com/c/a/Security/UBS-Rogue-Trader-Underscores-Insider-Threats-Facing-Enterprises-368962/

By Fahmida Y. Rashid
eWEEK.com
2011-09-15

The arrest of a rogue stock trader at UBS, one of the world’s largest
and most recognized banks, should serve as a wake-up call to all
enterprises that many security threats actually come from inside their
organization rather than from outside, according to several security
experts.

London...
 

Posted by InfoSec News on Sep 15

http://gcn.com/articles/2011/09/06/digital-conflict-undisclosed-cyberattack-data.aspx

By Kevin Coleman
GCN.com
Sept 15, 2011

Hostile activities in cyberspace have grown, and by many accounts the growth
rate has been dramatic. But few people have a real appreciation of just how big
this issue actually is, and for good reason. When we look at the cyberattacks,
we break the collective environment into three distinct areas:

* What happens...
 

Posted by InfoSec News on Sep 15

========================================================================

The Secunia Weekly Advisory Summary
2011-09-08 - 2011-09-15

This week: 57 advisories

========================================================================
Table of Contents:

1.....................................................Word From Secunia...
 

Posted by InfoSec News on Sep 15

http://www.hollywoodreporter.com/news/mila-kunis-is-latest-actress-236045

By Patrick Kevin Day
The Hollywood Reporter
9/15/2011

Mila Kunis appears to be the latest star to have her hacked cell phone
pictures leak online.

According to TMZ, several of the Black Swan and Friends With Benefits
star's private photos, including shots of her Friends co-star Justin
Timberlake, have been accessed by the hacker group targeting
celebrities....
 
Internet Storm Center Infocon Status